Use of this website is subject to the following conditions:
Intellectual Property Rights
The texts, drawings, photographs, films, images, data, databases, software, names, trademarks and domain names, trademarks, logos and other elements of this site are protected by copyright and belong to Cyso Hosting BV. It is prohibited without prior written consent of Cyso Hosting BV to store (other than required for the website to view), reproduce, modify, publish, distribute or transmit, sell or otherwise transfer or grant any rights to third parties of information found on the website.
Unauthorized use of the website
You commit yourself to (1) not use the information in an unlawful matter (2) not use the website in any way that causes the website to be damaged, corrupted, interrupted, stop, or otherwise made less efficient (3) not use the website for transmission or posting of computer viruses or for transmission or posting of material of a slanderous, obscene or threatening nature (4) not use website in such a manner that would infringe on the rights of a natural person, legal or association, including, but not limited to, rights of privacy and intellectual property (5) not use the website for posting or transmission of material for promotional or publicity purposes without prior permission from Cyso Hosting BV, except if so requested by the recipient.
Links to other websites
This website may contain links to websites or web pages of third parties or otherwise refer to these. Cyso Hosting BV has no control over the content or other features of these websites or web pages and is in no way liable for the content or features. Any links by Cyso Hosting BV do not in any way imply approval of the content of these websites or web pages.
Advice on the website
Where, through the website, directly or indirectly, advice is offered regarding medical, legal, financial or other personal or business decisions, this advice is without any guarantee and without any liability on the part of Cyso Hosting BV. You always need a specialist to consult for additional information regarding the advice on your specific situation.
Applicable Law and Jurisdiction
Dutch law is applicable to this website.
Abuse and anti-spam policy
What is spam ?
‘Sending a message, especially an advertisement, to more than five recipients, is by itself spamming unless the individuals have specifically requested to be added to a mailing list on that topic. This includes both commercial advertisements and informational messages sent to recipients via electronic mail (email) as well as off-topic messages posted in Usenet discussion groups where the recipient has not requested or invited the message. Email is a person-to-person medium, not a broadcast medium.’
Our spam Policy, why?
Unlike senders of traditional “junk mail” who are required to pay for envelopes, materials and postage, senders of UBE/UCE can, given the nature of the internet, impose enormous costs on the recipients of their messages at little or no cost to themselves.
Costs imposed on UBE/UCE recipients include:
- ISP bandwidth used to deliver UBE/UCE
- additional IP infrastructure needed to handle UBE/UCE
- time and money wasted in filtering out and deleting UBE/UCE.
- Customers are not allowed to transmit bulk unsolicited commercial email (“UCE”) or unsolicited bulk email (“UBE”) messages to any Internet user via their Cyso address-space or via any other Internet connection that in any way implicates the Cysof net blocks. This also counts if you are using a different provider to mail and have the intended site hosted at Cyso.
- Customers are not allowed to temporarily or permanently connect an insufficiently secured mail server to the Cyso network. Your mail server is only allowed to accept incoming email that is destined for your own email domain(s), and it is only allowed to transmit outgoing email that originates inside your own IP range or local network. Under no circumstance is your mail server allowed to accept email from outside your network for subsequent delivery outside your network. In short: your mail server must be either a starting point or an end point for email, not a transit point. Cyso explicitly reserves the right to block an insufficiently secured mail server without advance notice.
- Bulk mailing is only allowed using OPT-IN mailings.Iif databases are used in which the receiver did not authorize YOU, the mailer, to use his email address, will be seen as UBE/UCE and we will act accordingly, upon receiving of complaints.
- When we.re being notified of an alleged violation of our spam policy by you or one of your customers, Cyso will initiate an immediate investigation (within 48 hours of notification). During the investigation, Cyso may restrict customer access to the network to prevent further violations. If a customer is found to be in violation of our spam policy, Cyso may, at its sole discretion, restrict, suspend or terminate customer’s account. In case of being a First Time Offender, depending on the severity you.ll receive an official warning.
- The next time a customer is found to be in violation of our spam policy, Cyso will remove your DNS records without advance notice. This will stay so for 48 hours, thereafter it can be added again. For each time we receive complaints we’ll keep repeating this procedure so the mailing will cause no benefit. If your server was used to send spam we’ll setup a lock on port 25 (SMTP) for your IP’s. (Second Time Offender)
- When we keep receiving complaints Cyso can and will terminate the customers account.
- Cyso has the right to block traffic from or to other networks to prevent receiving or broadcasting UBE/UCE. This may result in temporarily loss of connection to other networks.
The Dutch version of our spam policy prevails.
If you have any questions regarding the above, please contact email@example.com.
Acceptable Use Policy
This English text is for your convenience. For legal reasons the Dutch version of this text will prevail!
If Cyso has provided you with a shell account, the following additional rules apply:
- You are not allowed to use the servers for illegal activities such as: spam, hacking, port scanning and harassing. We decide what’s illegal or not and our decision is final!
- It’s not allowed to use the servers to distribute warez, illegal software or MP3 and other copyrighted materials. We decide what’s illegal or not and our decision is final!
- Never give out your username and password to someone else. The account belongs to you only. It’s your responsibility!
- Don’t use large amounts of CPU time / memory or bandwith
- Don’t exceed your diskquota.
Please report abuse at firstname.lastname@example.org. Violation of the rules will indefinitely lead to cancellation of your account.
Fair Use Policy
This English text is offered for your convenience. For legal reasons the Dutch version of this text will prevail!
To keep the costs of hosting your website and e-mail low, a lot of people use a shared hosting solution. In this solution the server is shared with different users. This is usually not a problem, as a server is capable of handling hundreds of websites. To make sure everybody gets what he pays for there is one rule:
- Your website / email may not use a disappropriate amount of system resources on the server.
This rule is to prevent that a single website uses so much resources, that other websites would be work slowly of even not work at all.
If you’re in violation of our Fair use Policy we will contact you and work with you on a different solution. In some cases more efficient programming makes a website run better or maybe a dedicated server is the solution. The main goal our Fair use policy is to avoid abuse.
Responsible Disclosure Policy
As a hosting provider, we consider the security of our systems and those of our customers highly important. In spite of our concern for the security of these systems, it may nevertheless happen that a weak spot exists.
If you have found a weak spot in one of the ICT systems within our network, we would like to hear about this from you, so the necessary measures can be taken as quickly as possible to rectify the vulnerability. We collaborate with you in order to better protect our customers and our systems.
We ask you to:
- E-mail your findings to email@example.com.
- Handle the knowledge on the security problem with care by not performing any acts other than those necessary to reveal the security problem.
- Do not share the information on the security problem with others until the problem has been solved.
- Do not utilize attacks on physical security, social engineering, distributed denial of service attacks, spam or third party applications.
- Report the vulnerability as quickly as possible after its discovery.
- Provide sufficient information to reproduce the problem so that we can solve the problem as quickly as possible. The IP address or the URL of the system affected and a description of the vulnerability is usually sufficient, but more may be needed for more complex vulnerabilities.
What you can expect from us:
- We respond within three working days to a report with an assessment of the report and an expected date for a solution.
- If you comply with the conditions above when reporting the observed vulnerability in one of our ICT systems, we will not attach any legal consequences to this report.
- We will handle a report confidentially and will not share personal details with third parties without permission from the reporter, unless this is mandatory by virtue of a judicial decision.
- We will keep the reporter up-to-date on the progress made with solving the problem.
- In mutual consultation, we can, if you desire, mention your name as the discoverer of the reported vulnerability.
- We offer a place on our Responsible Disclosure Hall of Fame as a thank you for reporting a security problem that is unknown to us. For reporting security issues we consider very serious, we may offer additional rewards. The reward offered varies (no cash though), depending on the seriousness of the security problem and the quality of the report.
We strive to resolve any security problems as quickly as possible and we like to be involved in any publication about the problem after it has been resolved.
Check our Responsible Disclosure Hall of Fame
Domain Registration Policy
Registering Internet domain names though Cyso is subject to the following policies:
All parties registering ICANN-managed internet domains through Cyso Hosting B.V. are required to be familiar with ICANN’s generic educational information as described here. Furthermore, parties must comply with ICANN’s Registrants Benefits and Responsibilities.
Unless specified otherwise, all domains registered through Cyso will be renewed automatically. Customers need to inform Cyso at least 30 days before the expiry date which domains do not need to be renewed. Failure to indicate this is time for domains involved will result in automatic renewal and billing accordingly.
Restoring a non-renewed domain during the domain’s redemption period is possible. Fees may vary depending on the TLD.
Customers who request dedicated IPv4 and/or IPv6 addresses or ranges from Cyso are required to be able to justify the reason. When requesting dedicated IP addresses, Cyso may request the arguments behind it and judge them according to RIPE policies.
Customers using Microsoft software licenses through Cyso, are required to comply with Microsoft’s End User License Terms. These are provided with their contract. Using licenses provided by Cyso is only allowed as long as their contract with Cyso lasts.
Procedure Notice and Takedown
The following procedure applies if Cyso receives complaints about material offered by one of its customers and is hosted within Cyso’s network. This procedure follows the guidelines of the Dutch Hosting Provider Association and was compiled by ICTRecht.
Note: this is an English version of an original Dutch document, translated for your convenience. The Dutch version of this document prevails at all times.
Intermediary: Cyso Hosting B.V.
Client: Cyso Hosting B.V.’s client.
- If Intermediary receives a complaint through the complaint form, it shall confirm the receipt of the reporter as soon as possible. Intermediary checks the data as much as they can. In case of missing or incorrect information provided through the complaint form by the reporter, Intermediary will ask the reporter to provide additional information.
- In case the information is not or no longer online or is hosted by another provider, the Intermediary informs the reporter about this party. The complaint will then be considered resolved.
- If the reporter has not previously contacted the Client, Intermediary passes on the complaint to the Customer with a period of two working days to respond, and informs the reporter about passing on the complaint. Intermediary forwards the Client’s response to the reporter. He can then respond to Intermediary whether or not he agrees with the response. If so, then the complaint will be considered dealt with. Intermediary informs the Client about this. In case of an absence of a response by the Client within two business days, Intermediary will carry out the following steps.
- If the reporter asked for removal of the material, but the Client is unwilling to remove or modify the information, Intermediary will make its own assessment:
- If Intermediary itself considers the complaint to be justified and there is no question of an emergency, he will ask the Client to remove the material. If the Client has not removed it within 1 day, Intermediary will delete or block the material and informs the Client and reporter that this has happened. Intermediary explains the removal to the Client. The complaint is considered resolved.
- If Intermediary itself considers the complaint to be unfounded, it will inform the reporter about its motivation. The complaint is considered resolved.
- If the reporter asked for identification of the Client, but the Client does not want to reveal himself to the reporter, Intermediary will make its own assessment:
- If Intermediary itself considers the complaint to be justified and the reporter to have a real stake in identification of the Client, Intermediary will provide name and address (location data) from the Client to the reporter and inform the Client thereof. The complaint is considered resolved.
- If Intermediary itself considers the complaint to be unfounded, or the reporter has no real stake to identification of the Client, it will inform the reporter about its motivation. The complaint is considered resolved.
- If in the opinion of Intermediary, a case should be considered urgent or an emergency, then Intermediary will go through the above steps within one working day. The reporter has to motivate an emergency notification. Based on this motivation, the Intermediary will determine whether the notification will be handled within one business day.
- In case of a criminal interest, Intermediary can decide to leave the information online for these reasons. In this case, Intermediary will inform only the reporter.
- In addition to the above (external) procedure, Intermediary may go through the following internal steps themselves.
Additional steps at points 4 and/or 5:
- If Intermediary itself is unable or unwilling to comment on the complaint, it will send the information received about the complaint to its legal adviser.
- The legal advisor will inform the Intermediary about the steps to follow. Intermediary is responsible for the implementation and informs the Client and reporter about this. The complaint is considered resolved.
When actually removing or making materials inaccessible, Intermediary will act carefully and in proportion, with Intermediary preventing, as much as possible, legal material of the Client or others being made inaccessible.